Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and entity for authenticating notes in network service

A network service and authentication method technology, applied in transmission systems, digital transmission systems, payment systems, etc., can solve the problems of complex service logic functions and centralized management and maintenance of bills, and achieve the effect of simplifying logic functions

Active Publication Date: 2011-11-02
XFUSION DIGITAL TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] In the process of realizing the above authentication, the inventors found that at least the following problems exist in the prior art: Web Service Providers (WSP, Web Service Providers) such as IdP and ID-WSF discovery service need to separately generate a SAML assertion for The next-accessed device authenticates the generated assertion
[0014] The above SAML assertion is a ticket that needs to be authenticated. In order to be able to complete the above functions, the IdP and the ID-WSF discovery service need to have ticket generation and maintenance functions at the same time. Centralized management and maintenance are not possible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and entity for authenticating notes in network service
  • Method, system and entity for authenticating notes in network service
  • Method, system and entity for authenticating notes in network service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] This embodiment provides a bill authentication method in network services, such as figure 2 As shown, the ticket authentication method includes the following steps:

[0068] 201. If the user requests the service provider to provide corresponding services, and the service requires the network service provider to authenticate the user, the service provider will send an authentication request to the network service provider as the network service requester, and the authentication request includes the network A ticket provided by the service requester.

[0069] 202. The network service provider sends the ticket to a ticket authentication entity, so that the ticket authentication entity can authenticate the ticket.

[0070] 203. After completing the authentication, the ticket authentication entity returns an authentication result to the network service provider.

[0071] 204. After receiving the authentication result returned by the ticket authentication entity, the netwo...

Embodiment 2

[0078] This embodiment takes figure 1 The acquisition of user identity attributes in the application scenario is used as the application scenario. In this application scenario, the SP acts as the network service requester, and the IdP, ID-WSF discovery service, and AP all act as the network service provider. Since the IdP itself has the authentication function, this implementation For example, the IdP is used as the ticket authentication entity at the same time. Such as Image 6 As shown, in this application scenario, the ticket authentication method in the network service is as follows:

[0079] 601. The SP, as a network service requester, initiates an authentication request to the IdP, requesting authentication of the user's SAMLAssertion (assertion), where the SAML assertion is equivalent to a ticket provided by the user.

[0080] 602. The IdP authenticates the user's SAML assertion, and sends the authentication result to the SP. If the authentication result is passed, it...

Embodiment 3

[0099] This embodiment is also based on figure 1 Obtaining user identity attributes in is used as an application scenario. In this application scenario, the SP is also used as the network service requester, the IdP, ID-WSF discovery service, and AP are all used as the network service provider, and the IdP is used as the ticket authentication entity. Such as Figure 7 As shown, in this application scenario, the ticket authentication method in the network service is as follows:

[0100] 701. The SP, as a network service requester, initiates an authentication request to the IdP, requesting authentication of the user's SAML assertion, where the SAML assertion is equivalent to a ticket provided by the user.

[0101] 702. The IdP authenticates the user's SAML assertion, and sends the authentication result to the SP. If the authentication result is passed, the resource reference of the user's ID-WSF discovery service and the ticket allocated by the IdP to the SP need to be returned ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, a system and an entity for authenticating notes in network service, relates to a technology for authenticating user landing notes of network serviceand solves the problem that notes can not be uniformly managed in the prior art. The embodiment maintains the notes through the note authenticating entity, all network service providers need to authenticate the notes by the note authenticating entity, and an authenticating result is returned to a network service requester by the network service providers. The embodiment of the invention is mainlyused for the network service providers, such as IdP, ID-WSF discovery service, AP, and the like.

Description

technical field [0001] The invention relates to the field of network services, in particular to a method for authenticating user login tickets for network services when free alliances are used to provide network services, and a ticket authentication system using the method in the network service process. Background technique [0002] Single sign-on (SSO, Single Sign-on) is a technology that facilitates users to access multiple service providers (SP, Service Provider). Users only need to log in to SP once with a user name and password, and then they can establish trust in multiple Free shuttle between the SPs of the alliance, no need to enter the user name and password every time you visit a SP. [0003] In the case of single sign-on, the message exchange and processing process of the user logging in to the SP includes: first, the user sends a login request to the SP through the user agent, and the SP obtains a suitable identity provider (IdP, Identity Provider) address, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCG06Q20/409G06Q20/14G07F7/04G07F7/08G06Q20/042H04L9/3213G06Q20/342G06Q20/40
Inventor 王雷杨健陈国乔董挺张惠萍范姝男
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products